메뉴 건너뛰기




Volumn 48, Issue 4, 2016, Pages 469-488

Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms

Author keywords

Android investigation; digital forensics; Facebook forensics; Google+ forensics; iOS investigation; LinkedIn forensics; mobile app forensics; mobile device forensics; social networking application forensics; Twitter forensics

Indexed keywords

ARTICLE; ARTIFACT; CLINICAL RESEARCH; CONCEPTUAL FRAMEWORK; CRIMINOLOGY; DATA BASE; DATA COLLECTION METHOD; FORENSIC IDENTIFICATION; FORENSIC SCIENCE; INFORMATION PROCESSING; INFORMATION SYSTEM; INTERNET; MOBILE APPLICATION; MOBILE PHONE; PRACTICE GUIDELINE; SMARTPHONE; SOCIAL NETWORK; TEXT MESSAGING; WEB BROWSER;

EID: 84938850824     PISSN: 00450618     EISSN: 1834562X     Source Type: Journal    
DOI: 10.1080/00450618.2015.1066854     Document Type: Article
Times cited : (74)

References (49)
  • 1
    • 37249053884 scopus 로고    scopus 로고
    • Social network sites: definition, history, and scholarship
    • D.M.Boyd, N.B.Ellison. Social network sites: definition, history, and scholarship. J Comput-Mediat Comm. 2007;13(1):210–230.10.1111/j.1083-6101.2007.00393.x
    • (2007) J Comput-Mediat Comm , vol.13 , Issue.1 , pp. 210-230
    • Boyd, D.M.1    Ellison, N.B.2
  • 3
    • 84912044881 scopus 로고    scopus 로고
    • Forensic investigation of social networking applications
    • M.Taylor, J.Haggerty, D.Gresty, P.Almond, T.Berry. Forensic investigation of social networking applications. Network Secur. 2014;2014(11):9–16.10.1016/S1353-4858(14)70112-6
    • (2014) Network Secur , vol.2014 , Issue.11 , pp. 9-16
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Almond, P.4    Berry, T.5
  • 4
    • 84881484461 scopus 로고    scopus 로고
    • Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users
    • V.Kisekka, S.Bagchi-Sen, H.Raghav Rao. Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users. Comput Human Behav. 2013;29(6):2722–2729.10.1016/j.chb.2013.07.023
    • (2013) Comput Human Behav , vol.29 , Issue.6 , pp. 2722-2729
    • Kisekka, V.1    Bagchi-Sen, S.2    Raghav Rao, H.3
  • 5
    • 84907212016 scopus 로고    scopus 로고
    • Pew Research Center’s Internet & American Life Project [Internet], [cited 20 November 2014]. Available from
    • J.Brenner. Social networking fact sheet. Pew Research Center’s Internet & American Life Project [Internet]. 2013 [cited 20 November 2014]. Available from: http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/
    • (2013) Social networking fact sheet
    • Brenner, J.1
  • 8
    • 84876542471 scopus 로고    scopus 로고
    • From keyloggers to touchloggers: take the rough with the smooth
    • D.Damopoulos, G.Kambourakis, S.Gritzalis. From keyloggers to touchloggers: take the rough with the smooth. Comput Secur. 2013;32:102–114.10.1016/j.cose.2012.10.002
    • (2013) Comput Secur , vol.32 , pp. 102-114
    • Damopoulos, D.1    Kambourakis, G.2    Gritzalis, S.3
  • 9
    • 84905084508 scopus 로고    scopus 로고
    • Exposing mobile malware from the inside (or what is your mobile app really doing?)
    • D.Damopoulos, G.Kambourakis, S.Gritzalis, S.O.Park. Exposing mobile malware from the inside (or what is your mobile app really doing?) P2P Networking App. 2012;1–11.
    • (2012) P2P Networking App , pp. 1-11
    • Damopoulos, D.1    Kambourakis, G.2    Gritzalis, S.3    Park, S.O.4
  • 10
    • 84889085369 scopus 로고    scopus 로고
    • A critical review of 7 years of mobile device forensics
    • K.Barmpatsalou, D.Damopoulos, G.Kambourakis, V.Katos. A critical review of 7 years of mobile device forensics. Digital Invest. 2013;10(4):323–349.10.1016/j.diin.2013.10.003
    • (2013) Digital Invest , vol.10 , Issue.4 , pp. 323-349
    • Barmpatsalou, K.1    Damopoulos, D.2    Kambourakis, G.3    Katos, V.4
  • 13
    • 84963541600 scopus 로고    scopus 로고
    • Chapter 14-Conceptual evidence collection and analysis methodology for Android devices
    • Choo K.-K.R., (ed), Boston, MA: Syngress
    • B.Martini, Q.Do, K.-K.R.Choo. Chapter 14-Conceptual evidence collection and analysis methodology for Android devices. In: K.-K.R.Choo, editor. The Cloud Security Ecosystem. Boston, MA: Syngress; 2015. p. 285–307.
    • (2015) The Cloud Security Ecosystem , pp. 285-307
    • Martini, B.1    Do, Q.2    Choo, K.-K.R.3
  • 14
    • 84964322400 scopus 로고    scopus 로고
    • Chapter 19-Ubuntu One investigation: detecting evidences on client machines
    • Choo K.-K.R., (ed), Boston, MA: Syngress
    • M.Shariati, A.Dehghantanha, B.Martini, K.-K.R.Choo. Chapter 19-Ubuntu One investigation: detecting evidences on client machines. In: K.-K.R.Choo, editor. The Cloud Security Ecosystem. Boston, MA: Syngress; 2015. p. 429–446.
    • (2015) The Cloud Security Ecosystem , pp. 429-446
    • Shariati, M.1    Dehghantanha, A.2    Martini, B.3    Choo, K.-K.R.4
  • 15
    • 84862641293 scopus 로고    scopus 로고
    • Commercial use of Facebook and Twitter – risks and rewards
    • C.Hutchings. Commercial use of Facebook and Twitter – risks and rewards. Comput Fraud Secur. 2012;2012(6):19–20.10.1016/S1361-3723(12)70065-9
    • (2012) Comput Fraud Secur , vol.2012 , Issue.6 , pp. 19-20
    • Hutchings, C.1
  • 16
    • 84886414710 scopus 로고    scopus 로고
    • A framework for the E-Discovery of social media content in the United States
    • J.C.Sipior, B.T.Ward, L.Volonino, L.MacGabhann. A framework for the E-Discovery of social media content in the United States. Inf Sys Manag. 2013;30(4):352–358.10.1080/10580530.2013.832965
    • (2013) Inf Sys Manag , vol.30 , Issue.4 , pp. 352-358
    • Sipior, J.C.1    Ward, B.T.2    Volonino, L.3    MacGabhann, L.4
  • 17
    • 84976572271 scopus 로고    scopus 로고
    • Towards “crime specific” digital investigation frameworks
    • University of Cardiff, Cardiff:
    • O.Angelopoulou, S.Vidaliss. Towards “crime specific” digital investigation frameworks. In: School of Computer Science, University of Cardiff, Cardiff; 2013.
    • (2013) School of Computer Science
    • Angelopoulou, O.1    Vidaliss, S.2
  • 19
    • 80051672577 scopus 로고    scopus 로고
    • A comparison of forensic evidence recovery techniques for a windows mobile smart phone
    • G.Grispos, T.Storer, W.B.Glisson. A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Invest. 2011;8(1):23–36.10.1016/j.diin.2011.05.016
    • (2011) Digital Invest , vol.8 , Issue.1 , pp. 23-36
    • Grispos, G.1    Storer, T.2    Glisson, W.B.3
  • 23
    • 84881296322 scopus 로고    scopus 로고
    • A study of user data integrity during acquisition of Android devices
    • N.Son, Y.Lee, D.Kim, J.I.James, S.Lee, K.Lee. A study of user data integrity during acquisition of Android devices. Digital Invest. 2013;10(Supplement):S3–S11.10.1016/j.diin.2013.06.001
    • (2013) Digital Invest , vol.10 , pp. S3-S11
    • Son, N.1    Lee, Y.2    Kim, D.3    James, J.I.4    Lee, S.5    Lee, K.6
  • 24
    • 79961091178 scopus 로고    scopus 로고
    • Toward a general collection methodology for Android devices
    • T.Vidas, C.Zhang, N.Christin. Toward a general collection methodology for Android devices. Digital Invest. 2011;8(Supplement):S14–S24.10.1016/j.diin.2011.05.003
    • (2011) Digital Invest , vol.8 , pp. S14-S24
    • Vidas, T.1    Zhang, C.2    Christin, N.3
  • 26
    • 84857917909 scopus 로고    scopus 로고
    • Acquisition and analysis of volatile memory from android devices
    • J.Sylve, A.Case, L.Marziale, G.G.Richard. Acquisition and analysis of volatile memory from android devices. Digital Invest. 2012;8(3–4):175–184.10.1016/j.diin.2011.10.003
    • (2012) Digital Invest , vol.8 , Issue.3-4 , pp. 175-184
    • Sylve, J.1    Case, A.2    Marziale, L.3    Richard, G.G.4
  • 27
    • 84912008171 scopus 로고    scopus 로고
    • Exfiltrating data from Android devices
    • Q.Do, B.Martini, K.-K.R.Choo. Exfiltrating data from Android devices. Comput Secur. 2015;48:74–91.10.1016/j.cose.2014.10.016
    • (2015) Comput Secur , vol.48 , pp. 74-91
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 31
    • 79961063454 scopus 로고    scopus 로고
    • iPhone 3GS forensics: Logical analysis using apple iTunes backup utility
    • M.Bader, I.Baggili. iPhone 3GS forensics: Logical analysis using apple iTunes backup utility. Small Scale Digital Device Forensics J. 2010;4(1):1–15.
    • (2010) Small Scale Digital Device Forensics J , vol.4 , Issue.1 , pp. 1-15
    • Bader, M.1    Baggili, I.2
  • 33
    • 84864628454 scopus 로고    scopus 로고
    • Forensic analysis of social networking applications on mobile devices
    • N.Al Mutawa I.Baggili, A.Marrington. Forensic analysis of social networking applications on mobile devices. Digital Invest. 2012;9:S24–S33.10.1016/j.diin.2012.05.007
    • (2012) Digital Invest , vol.9 , pp. S24-S33
    • Al Mutawa, N.1    Baggili, I.2    Marrington, A.3
  • 37
    • 84855837531 scopus 로고    scopus 로고
    • Current Trends in Information Technology (CTIT), 2011 International Conference and Workshop on. IEEE
    • H.Said, A.Yousif, H.Humaid. IPhone forensics techniques and crime investigation. in: Current Trends in Information Technology (CTIT), 2011 International Conference and Workshop on. IEEE; 2011. p. 120–125.
    • (2011) IPhone forensics techniques and crime investigation , pp. 120-125
    • Said, H.1    Yousif, A.2    Humaid, H.3
  • 39
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • D.Quick, K.-K.R.Choo. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener Comput Syst. 2013;29(6):1378–1394.10.1016/j.future.2013.02.001
    • (2013) Future Gener Comput Syst , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 40
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: data remnants on user machines
    • D.Quick, K.-K.R.Choo. Dropbox analysis: data remnants on user machines. Digital Invest. 2013;10(1):3–18.10.1016/j.diin.2013.02.003
    • (2013) Digital Invest , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 41
    • 84896319180 scopus 로고    scopus 로고
    • Google drive: forensic analysis of data remnants
    • D.Quick, K.-K.R.Choo. Google drive: forensic analysis of data remnants. J Network Comput App. 2014;40:179–193.10.1016/j.jnca.2013.09.016
    • (2014) J Network Comput App , vol.40 , pp. 179-193
    • Quick, D.1    Choo, K.-K.R.2
  • 42
    • 84908237752 scopus 로고    scopus 로고
    • Forensic analysis of WhatsApp Messenger on android smartphones
    • C.Anglano. Forensic analysis of WhatsApp Messenger on android smartphones. Digital Invest. 2014;11(3):201–213.10.1016/j.diin.2014.04.003
    • (2014) Digital Invest , vol.11 , Issue.3 , pp. 201-213
    • Anglano, C.1
  • 43
    • 15944399154 scopus 로고    scopus 로고
    • What is forensic computing? Trends & issues in crime and criminal justice
    • R.McKemmish. What is forensic computing? Trends & issues in crime and criminal justice Australian Inst Criminology; 1999;118:1–6.
    • (1999) Australian Inst Criminology , vol.118 , pp. 1-6
    • McKemmish, R.1
  • 44
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • B.Martini, K.-K.R.Choo. An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 2012;9(2):71–80.10.1016/j.diin.2012.07.001
    • (2012) Digital Invest , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 45
    • 84920152770 scopus 로고    scopus 로고
    • Distributed filesystem forensics: XtreemFS as a case study
    • B.Martini, K.-K.R.Choo. Distributed filesystem forensics: XtreemFS as a case study. Digital Invest. 2014;11(4):295–313.10.1016/j.diin.2014.08.002
    • (2014) Digital Invest , vol.11 , Issue.4 , pp. 295-313
    • Martini, B.1    Choo, K.-K.R.2
  • 47
    • 85018181307 scopus 로고    scopus 로고
    • Mobile cloud forensics: an analysis of seven popular Android apps
    • Choo K.-K.R., (ed), Boston, MA: Syngress
    • B.Martini, Q.Do, K.-K.R.Choo. Mobile cloud forensics: an analysis of seven popular Android apps. In: K.-K.R.Choo, editor. The cloud security ecosystem. Boston, MA: Syngress; 2015. p. 309–345.
    • (2015) The cloud security ecosystem , pp. 309-345
    • Martini, B.1    Do, Q.2    Choo, K.-K.R.3
  • 49
    • 84976544313 scopus 로고    scopus 로고
    • [cited 2014 November 24]. Available from:
    • EDRM LLC, EDRM Enron Email Data Set. EDRM LLC [Internet]. 2013 [cited 2014 November 24]. Available from: http://www.edrm.net/resources/data-sets/edrm-enron-email-data-set
    • (2013) EDRM Enron Email Data Set. EDRM LLC [Internet]


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.